CVE-2002-0412
 
Severity Score
7.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Format string vulnerability in TraceEvent function for ntop before 2.1 allows remote attackers to execute arbitrary code by causing format strings to be injected into calls to the syslog function, via (1) an HTTP GET request, (2) a user name in HTTP authentication, or (3) a password in HTTP authentication.
Vulnerabilidad de cadena de formato en la función TraceEvent para ntop anteriores a la 2.1 permite a atacantes remotos la ejecución de código arbitrario haciendo que la cadena del formato forme parte de las llamadas a la función syslog, mediante:
una petición HTTP GET
un nombre de usuario en la autenticación HTTP
una contraseña en la autenticación HTTP.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2002-06-07 CVE Reserved
- 2002-08-12 CVE Published
- 2023-04-17 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0056.html | Mailing List | |
http://listmanager.unipi.it/pipermail/ntop-dev/2002-February/000489.html | X_refsource_misc | |
http://marc.info/?l=bugtraq&m=101854261030453&w=2 | Mailing List | |
http://marc.info/?l=bugtraq&m=101856541322245&w=2 | Mailing List | |
http://marc.info/?l=bugtraq&m=101908224609740&w=2 | Mailing List | |
http://snapshot.ntop.org | X_refsource_confirm | |
http://www.osvdb.org/5307 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.iss.net/security_center/static/8347.php | 2016-10-18 | |
http://www.securityfocus.com/bid/4225 | 2016-10-18 |
URL | Date | SRC |
---|---|---|
http://online.securityfocus.com/archive/1/259642 | 2016-10-18 |